diff options
author | Angelos D. Keromytis <angelos@cvs.openbsd.org> | 2001-06-05 10:04:47 +0000 |
---|---|---|
committer | Angelos D. Keromytis <angelos@cvs.openbsd.org> | 2001-06-05 10:04:47 +0000 |
commit | 93e55c5cc0e6ec26565a7ca210edb3902894ed61 (patch) | |
tree | 8044718bffda2e45d44a6a90589aa64c8841b2df | |
parent | 4f8d576304cb0226a017b02be1ae3e8a350b5ba7 (diff) |
Don't use log_error() if it's an internal error.
-rw-r--r-- | sbin/isakmpd/ike_auth.c | 17 |
1 files changed, 9 insertions, 8 deletions
diff --git a/sbin/isakmpd/ike_auth.c b/sbin/isakmpd/ike_auth.c index 04ea1a1957b..e7447938781 100644 --- a/sbin/isakmpd/ike_auth.c +++ b/sbin/isakmpd/ike_auth.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ike_auth.c,v 1.43 2001/06/05 05:59:42 niklas Exp $ */ +/* $OpenBSD: ike_auth.c,v 1.44 2001/06/05 10:04:46 angelos Exp $ */ /* $EOM: ike_auth.c,v 1.59 2000/11/21 00:21:31 angelos Exp $ */ /* @@ -897,21 +897,21 @@ rsa_sig_encode_hash (struct message *msg) handler = cert_get (idtype); if (!handler) { - log_error ("rsa_sig_encode_hash: cert_get (%d) failed", idtype); + log_print ("rsa_sig_encode_hash: cert_get (%d) failed", idtype); return -1; } exchange->sent_cert = handler->cert_from_printable (buf); if (exchange->sent_cert == NULL) { - log_error ("rsa_sig_encode_hash: failed to retrieve certificate"); + log_print ("rsa_sig_encode_hash: failed to retrieve certificate"); return -1; } handler->cert_serialize (exchange->sent_cert, &data, &datalen); if (data == NULL) { - log_error ("rsa_sig_encode_hash: cert serialization failed"); + log_print ("rsa_sig_encode_hash: cert serialization failed"); return -1; } @@ -967,7 +967,8 @@ rsa_sig_encode_hash (struct message *msg) if (!exchange->sent_cert) { free (data); - log_error ("rsa_sig_encode_hash: failed to get certificate from wire encoding"); + log_print ("rsa_sig_encode_hash: failed to get certificate from wire " + "encoding"); return -1; } @@ -1032,7 +1033,7 @@ rsa_sig_encode_hash (struct message *msg) &datalen); if ((data == NULL) || (datalen == -1)) { - log_error ("rsa_sig_encode_hash: badly formatted RSA private key"); + log_print ("rsa_sig_encode_hash: badly formatted RSA private key"); return 0; } @@ -1042,7 +1043,7 @@ rsa_sig_encode_hash (struct message *msg) datalen); if (exchange->sent_key == NULL) { - log_error ("rsa_sig_encode_hash: bad RSA private key from dynamic " + log_print ("rsa_sig_encode_hash: bad RSA private key from dynamic " "SA acquisition subsystem"); return 0; } @@ -1092,7 +1093,7 @@ rsa_sig_encode_hash (struct message *msg) exchange->sent_key, RSA_PKCS1_PADDING)); if (datalen == -1) { - log_error ("rsa_sig_encode_hash: RSA_private_encrypt () failed"); + log_print ("rsa_sig_encode_hash: RSA_private_encrypt () failed"); free (buf); return -1; } |